Abstract: Land reallocation is one of the most important steps in
land consolidation projects. Many different models were proposed for
land reallocation in the literature such as Fuzzy Logic, block priority
based land reallocation and Spatial Decision Support Systems. A
model including four parts is considered for automatic block
reallocation with genetic algorithm method in land consolidation
projects. These stages are preparing data tables for a project land,
determining conditions and constraints of land reallocation, designing
command steps and logical flow chart of reallocation algorithm and
finally writing program codes of Genetic Algorithm respectively. In
this study, we designed the first three steps of the considered model
comprising four steps.
Abstract: The localization information is crucial for the
operation of WSN. There are principally two types of localization
algorithms. The Range-based localization algorithm has strict
requirements on hardware, thus is expensive to be implemented in
practice. The Range-free localization algorithm reduces the hardware
cost. However, it can only achieve high accuracy in ideal scenarios.
In this paper, we locate unknown nodes by incorporating the
advantages of these two types of methods. The proposed algorithm
makes the unknown nodes select the nearest anchor using the
Received Signal Strength Indicator (RSSI) and choose two other
anchors which are the most accurate to achieve the estimated
location. Our algorithm improves the localization accuracy compared
with previous algorithms, which has been demonstrated by the
simulating results.
Abstract: This paper deals with nonlinear vibration analysis
using finite element method for frame structures consisting of elastic
and viscoelastic damping layers supported by multiple nonlinear
concentrated springs with hysteresis damping. The frame is supported
by four nonlinear concentrated springs near the four corners. The
restoring forces of the springs have cubic non-linearity and linear
component of the nonlinear springs has complex quantity to represent
linear hysteresis damping. The damping layer of the frame structures
has complex modulus of elasticity. Further, the discretized equations in
physical coordinate are transformed into the nonlinear ordinary
coupled differential equations using normal coordinate corresponding
to linear natural modes. Comparing shares of strain energy of the
elastic frame, the damping layer and the springs, we evaluate the
influences of the damping couplings on the linear and nonlinear impact
responses. We also investigate influences of damping changed by
stiffness of the elastic frame on the nonlinear coupling in the damped
impact responses.
Abstract: Localization of nodes is one of the key issues of
Wireless Sensor Network (WSN) that gained a wide attention in
recent years. The existing localization techniques can be generally
categorized into two types: range-based and range-free. Compared
with rang-based schemes, the range-free schemes are more costeffective,
because no additional ranging devices are needed. As a
result, we focus our research on the range-free schemes. In this paper
we study three types of range-free location algorithms to compare the
localization error and energy consumption of each one. Centroid
algorithm requires a normal node has at least three neighbor anchors,
while DV-hop algorithm doesn’t have this requirement. The third
studied algorithm is the amorphous algorithm similar to DV-Hop
algorithm, and the idea is to calculate the hop distance between two
nodes instead of the linear distance between them. The simulation
results show that the localization accuracy of the amorphous
algorithm is higher than that of other algorithms and the energy
consumption does not increase too much.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: This study analyzes the critical gaps in the
architecture of European stability and the expected role of the
banking union as the new important step towards completing the
Economic and Monetary Union that should enable the creation of
safe and sound financial sector for the euro area market. The single
rulebook together with the Single Supervisory Mechanism and the
Single Resolution Mechanism - as two main pillars of the banking
union, should provide a consistent application of common rules and
administrative standards for supervision, recovery and resolution of
banks – with the final aim of replacing the former bail-out practice
with the bail-in system through which possible future bank failures
would be resolved by their own funds, i.e. with minimal costs for
taxpayers and real economy. In this way, the vicious circle between
banks and sovereigns would be broken. It would also reduce the
financial fragmentation recorded in the years of crisis as the result of
divergent behaviors in risk premium, lending activities and interest
rates between the core and the periphery. In addition, it should
strengthen the effectiveness of monetary transmission channels, in
particular the credit channels and overflows of liquidity on the money
market which, due to the fragmentation of the common financial
market, has been significantly disabled in period of crisis. However,
contrary to all the positive expectations related to the future
functioning of the banking union, major findings of this study
indicate that characteristics of the economic system in which the
banking union will operate should not be ignored. The euro area is an
integration of strong and weak entities with large differences in
economic development, wealth, assets of banking systems, growth
rates and accountability of fiscal policy. The analysis indicates that
low and unbalanced economic growth remains a challenge for the
maintenance of financial stability and this problem cannot be
resolved just by a single supervision. In many countries bank assets
exceed their GDP by several times and large banks are still a matter
of concern, because of their systemic importance for individual
countries and the euro zone as a whole. The creation of the Single
Supervisory Mechanism and the Single Resolution Mechanism is a
response to the European crisis, which has particularly affected
peripheral countries and caused the associated loop between the
banking crisis and the sovereign debt crisis, but has also influenced
banks’ balance sheets in the core countries, as the result of crossborder
capital flows. The creation of the SSM and the SRM should
prevent the similar episodes to happen again and should also provide
a new opportunity for strengthening of economic and financial
systems of the peripheral countries. On the other hand, there is a
potential threat that future focus of the ECB, resolution mechanism
and other relevant institutions will be extremely oriented towards
large and significant banks (whereby one half of them operate in the
core and most important euro area countries), and therefore it remains
questionable to what extent will the common resolution funds will be used for rescue of less important institutions. Recent geopolitical
developments will be the optimal indicator to show whether the
previously established mechanisms are sufficient enough to maintain
the adequate financial stability in the euro area market.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: Geographical routing protocol requires node physical
location information to make forwarding decision. Geographical
routing uses location service or position service to obtain the position
of a node. The geographical information is a geographic coordinates
or can be obtained through reference points on some fixed coordinate
system. Link can be formed between two nodes. Link lifetime plays a
crucial role in MANET. Link lifetime represent how long the link is
stable without any failure between the nodes. Link failure may occur
due to mobility and because of link failure energy of nodes can be
drained. Thus this paper proposes survey about link lifetime
prediction using geographical information.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: This paper presents results of the survey regarding the
awareness about HIV/AIDS among HIV-infected individuals. A
questionnaire covering various aspects of HIV-infection was
conducted among 110 HIV-infected individuals who attended the
G.A. Zaharyan Moscow Tuberculosis Clinic, Department for
treatment of TB patients with HIV. The questionnaire included
questions about modes of HIV transmission and preventive measures
against HIV/AIDS, as well as questions about age, gender, education
and employment status. The survey revealed that the respondents in
the whole had a good knowledge regarding modes of HIV
transmission and preventive measures against HIV/AIDS: about
83,6% male respondents and 85,7% female respondents gave an
accurate answers regarding the HIV-infection. However, the
overwhelming majority of the study participants, that is, 88,5% men
and 98% women, was quite ignorant about the risk of acquiring HIV
through saliva and toothbrush of HIV-infected individual. Though
that risk is rather insignificant, it is still biologically possible. And
this gap in knowledge needs to be filled. As the study showed another
point of concern was the fact, that despite the knowledge of HIV
transmission risk through unprotected sex about 40% percent of HIVpositive
men and 25% of HIV-positive women did not insist on using
condoms with their sexual partners. These findings indicate that there
are still some aspects about HIV-infection which needed to be
clarified and explained through more detailed and specific
educational programs.
Abstract: Nine Degrees of Freedom (9 DOF) systems are
already in development in many areas. In this paper, an integrated
pressure sensor is proposed that will make use of an already existing
monolithic 9 DOF inertial MEMS platform. Capacitive pressure
sensors can suffer from limited sensitivity for a given size of
membrane. This novel pressure sensor design increases the sensitivity
by over 5 times compared to a traditional array of square diaphragms
while still fitting within a 2 mm x 2 mm chip and maintaining a fixed
static capacitance. The improved design uses one large diaphragm
supported by pillars with fixed electrodes placed above the areas of
maximum deflection. The design optimization increases the
sensitivity from 0.22 fF/kPa to 1.16 fF/kPa. Temperature sensitivity
was also examined through simulation.
Abstract: This paper introduces a boost converter with a new
active snubber cell. In this circuit, all of the semiconductor
components in the converter softly turns on and turns off with the
help of the active snubber cell. Compared to the other converters, the
proposed converter has advantages of size, number of components
and cost. The main feature of proposed converter is that the extra
voltage stresses do not occur on the main switches and main diodes.
Also, the current stress on the main switch is acceptable level.
Moreover, the proposed converter can operates under light load
conditions and wide input line voltage. In this study, the operating
principle of the proposed converter is presented and its operation is
verified with the Proteus simulation software for a 1 kW and 100 kHz
model.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: To tackle the air pollution issues, Plug-in Hybrid
Electric Vehicles (PHEVs) are proposed as an appropriate solution.
Charging a large amount of PHEV batteries, if not controlled, would
have negative impacts on the distribution system. The control process
of charging of these vehicles can be centralized in parking lots that
may provide a chance for better coordination than the individual
charging in houses. In this paper, an optimization-based approach is
proposed to determine the optimum PHEV parking capacities in
candidate nodes of the distribution system. In so doing, a profile for
charging and discharging of PHEVs is developed in order to flatten
the network load profile. Then, this profile is used in solving an
optimization problem to minimize the distribution system losses. The
outputs of the proposed method are the proper place for PHEV
parking lots and optimum capacity for each parking. The application
of the proposed method on the IEEE-34 node test feeder verifies the
effectiveness of the method.
Abstract: In this paper, we consider a cognitive relay network
(CRN) in which the primary receiver (PR) is protected by peak
transmit power ¯PST and/or peak interference power Q constraints.
In addition, the interference effect from the primary transmitter (PT)
is considered to show its impact on the performance of the CRN. We
investigate the outage probability (OP) and outage capacity (OC) of
the CRN by deriving closed-form expressions over Rayleigh fading
channel. Results show that both the OP and OC improve by increasing
the cooperative relay nodes as well as when the PT is far away from
the SR.
Abstract: Multiple User Interference (MUI) considers the
primary problem in Optical Code-Division Multiple Access
(OCDMA), which resulting from the overlapping among the users. In
this article we aim to mitigate this problem by studying an
interference cancellation scheme called successive interference
cancellation (SIC) scheme. This scheme will be tested on two
different detection schemes, spectral amplitude coding (SAC) and
direct detection systems (DS), using partial modified prime (PMP) as
the signature codes. It was found that SIC scheme based on both SAC
and DS methods had a potential to suppress the intensity noise, that is
to say it can mitigate MUI noise. Furthermore, SIC/DS scheme
showed much lower bit error rate (BER) performance relative to
SIC/SAC scheme for different magnitude of effective power. Hence,
many more users can be supported by SIC/DS receiver system.
Abstract: Transparent nickel doped cobalt sulfide was fabricated
on a SnO2:F electrode and tested as an efficient electrocatalyst and as
an alternative to the expensive platinum counter electrode. In order to
investigate how this electrode could affect the electrical
characteristics of a dye-sensitized solar cell, we manufactured cells
with the same TiO2 photoanode sensitized with dye (N719) and
employing the same quasi-solid electrolyte, altering only the counter
electrode used. The cells were electrically and electrochemically
characterized and it was observed that the ones with the Ni doped
CoS2 outperformed the efficiency of the cells with the Pt counter
electrode (3.76% and 3.44% respectively). Particularly, the higher
efficiency of the cells with the Ni doped CoS2 counter electrode (CE)
is mainly because of the enhanced photocurrent density which is
attributed to the enhanced electrocatalytic ability of the CE and the
low charge transfer resistance at the CE/electrolyte interface.
Abstract: DNA Barcode provides good sources of needed
information to classify living species. The classification problem has
to be supported with reliable methods and algorithms. To analyze
species regions or entire genomes, it becomes necessary to use the
similarity sequence methods. A large set of sequences can be
simultaneously compared using Multiple Sequence Alignment which
is known to be NP-complete. However, all the used methods are still
computationally very expensive and require significant computational
infrastructure. Our goal is to build predictive models that are highly
accurate and interpretable. In fact, our method permits to avoid the
complex problem of form and structure in different classes of
organisms. The empirical data and their classification performances
are compared with other methods. Evenly, in this study, we present
our system which is consisted of three phases. The first one, is called
transformation, is composed of three sub steps; Electron-Ion
Interaction Pseudopotential (EIIP) for the codification of DNA
Barcodes, Fourier Transform and Power Spectrum Signal Processing.
Moreover, the second phase step is an approximation; it is
empowered by the use of Multi Library Wavelet Neural Networks
(MLWNN). Finally, the third one, is called the classification of DNA
Barcodes, is realized by applying the algorithm of hierarchical
classification.